“
now it’s computers and more computers
and soon everybody will have one,
3-year-olds will have computers
and everybody will know everything
about everybody else
long before they meet them.
nobody will want to meet anybody
else ever again
and everybody will be
a recluse
like I am now.
”
”
Charles Bukowski (The Continual Condition: Poems)
“
The Internet was a wonderful invention. It was a computer network which people used to remind other people that they were awful pieces of shit.
”
”
Jarett Kobek (I Hate the Internet)
“
People that hold onto hate for so long do so because they want to avoid dealing with their pain. They falsely believe if they forgive they are letting their enemy believe they are a doormat. What they don’t understand is hatred can’t be isolated or turned off. It manifests in their health, choices and belief systems. Their values and religious beliefs make adjustments to justify their negative emotions. Not unlike malware infesting a hard drive, their spirit slowly becomes corrupted and they make choices that don’t make logical sense to others. Hatred left unaddressed will crash a person’s spirit. The only thing he or she can do is to reboot, by fixing him or herself, not others. This might require installing a firewall of boundaries or parental controls on their emotions. Regardless of the approach, we are all connected on this "network of life" and each of us is responsible for cleaning up our spiritual registry.
”
”
Shannon L. Alder
“
Quantum machine learning promises to discover the optimal network topologies and hyperparameters automatically without human intervention.
”
”
Amit Ray (Quantum Computing Algorithms for Artificial Intelligence)
“
The level of intelligence has been tremendously increased, because people are thinking and communicating in terms of screens, and not in lettered books. Much of the real action is taking place in what is called cyberspace. People have learned how to boot up, activate, and transmit their brains.
Essentially, there’s a universe inside your brain. The number of connections possible inside your brain is limitless. And as people have learned to have more managerial and direct creative access to their brains, they have also developed matrices or networks of people that communicate electronically. There are direct brain/computer link-ups. You can just jack yourself in and pilot your brain around in cyberspace-electronic space.
”
”
Timothy Leary (Chaos & Cyber Culture)
“
On the first day of a college you will worry about how will you do inside the college? and at the last day of a college you will wonder what will you do outside the college?
”
”
Amit Kalantri
“
Maybe every time an intelligent species grew advanced enough to invent a global computer network, they would then develop some form of social media, which would immediately fill these beings with such an intense hatred for one another that they ended up wiping themselves out within four or five decades.
”
”
Ernest Cline (Ready Player Two (Ready Player One #2))
“
Why give a robot an order to obey orders—why aren't the original orders enough? Why command a robot not to do harm—wouldn't it be easier never to command it to do harm in the first place? Does the universe contain a mysterious force pulling entities toward malevolence, so that a positronic brain must be programmed to withstand it? Do intelligent beings inevitably develop an attitude problem? (…) Now that computers really have become smarter and more powerful, the anxiety has waned. Today's ubiquitous, networked computers have an unprecedented ability to do mischief should they ever go to the bad. But the only mayhem comes from unpredictable chaos or from human malice in the form of viruses. We no longer worry about electronic serial killers or subversive silicon cabals because we are beginning to appreciate that malevolence—like vision, motor coordination, and common sense—does not come free with computation but has to be programmed in. (…) Aggression, like every other part of human behavior we take for granted, is a challenging engineering problem!
”
”
Steven Pinker (How the Mind Works)
“
Since humans are individuals, it is difficult to connect them to one another and to make sure that they are all up to date. In contrast, computers aren’t individuals, and it is easy to integrate them into a single flexible network.
”
”
Yuval Noah Harari (21 Lessons for the 21st Century)
“
As human beings, we live by emotions and thoughts. We exchange them when we are in the same place at the same time, talking to each other, looking into each other's eyes, brushing against each other's skin. We are nourished by this network of encounters and exchanges. But, in reality, we do not need to be in the same place and time to have such exchanges. Thoughts and emotions that create bonds of attachment between us have no difficulty in crossing seas and decades, sometimes even centuries, tied to thin sheets of paper or dancing between the microchips of a computer. We are part of a network that goes far beyond the few days of our lives and the few square meters that we tread. This book is also a part of that weave...
”
”
Carlo Rovelli (L'ordine del tempo)
“
Search engines finds the information, not necessarily the truth.
”
”
Amit Kalantri
“
Random search can be more efficient than nonrandom search—something that Good and Turing had discovered at Bletchley Park. A random network, whether of neurons, computers, words, or ideas, contains solutions, waiting to be discovered, to problems that need not be explicitly defined.
”
”
George Dyson (Turing's Cathedral: The Origins of the Digital Universe)
“
A credit card is a leash around your neck. In the world of credit cards a person has no privacy…or at best protects her privacy only with great effort and much chicanery. Besides that, do you ever know what the computer network is doing when you poke your card into a slot? I don’t. I feel much safer with cash. I’ve never heard of anyone who had much luck arguing with a computer.
”
”
Robert A. Heinlein (Friday)
“
Well, when it became obvious that magic was going to wreck the computer networks, people tried to preserve portions of the Internet. They took snapshots of their servers and sent the data to a central database at the Library of Congress. The project became known as the Library of Alexandria, because in ancient times Alexandria's library was said to contain all the human knowledge, before some jackass burned it to the ground.
”
”
Ilona Andrews (Gunmetal Magic (Kate Daniels, #5.5; World of Kate Daniels, #6 & #6.5; Andrea Nash, #1))
“
I was even beginning to wonder if the invention of a worldwide social network was actually the “Great Filter” that theoretically caused all technological civilizations to go extinct, instead of nuclear weapons or climate change. Maybe every time an intelligent species grew advanced enough to invent a global computer network, they would then develop some form of social media, which would immediately fill these beings with such an intense hatred for one another that they ended up wiping themselves out within four or five decades. Only time would tell.
”
”
Ernest Cline (Ready Player Two (Ready Player One #2))
“
I claim that this bookless library is a dream, a hallucination of on-line addicts; network neophytes, and library-automation insiders...Instead, I suspect computers will deviously chew away at libraries from the inside. They'll eat up book budgets and require librarians that are more comfortable with computers than with children and scholars. Libraries will become adept at supplying the public with fast, low-quality information.
The result won't be a library without books--it'll be a library without value.
”
”
Clifford Stoll
“
With these rough categorizations established, the strategy works as follows: Schedule in advance when you’ll use the Internet, and then avoid it altogether outside these times. I suggest that you keep a notepad near your computer at work. On this pad, record the next time you’re allowed to use the Internet. Until you arrive at that time, absolutely no network connectivity is allowed—no matter how tempting.
”
”
Cal Newport (Deep Work: Rules for Focused Success in a Distracted World)
“
When you depend on the computer to remember your past, you focused on whatever past is kept on the computer.
”
”
Sherry Turkle (Alone Together: Why We Expect More from Technology and Less from Each Other)
“
Listening to teens talk about social media addiction reveals an interest not in features of their computers, smartphones, or even particular social media sites but in each other.
”
”
Danah Boyd (It's Complicated: The Social Lives of Networked Teens)
“
Whether it was Disney or the Navy, management guys always behaved the same. They never understood the technical issues; and they thought that screaming was the way to make things happen. And maybe it was, if you were shouting at your secretaries to get you a limousine. But screaming didn’t make any difference at all to the problems that Arnold now faced. The computer didn’t care if it was screamed at. The power network didn’t care if it was screamed at. Technical systems were completely indifferent to all this explosive human emotion. If anything, screaming was counterproductive, because Arnold now faced the virtual certainty that Nedry wasn’t coming back, which meant that Arnold himself had to go into the computer code and try and figure out what had gone wrong. It was going to be a painstaking job; he’d need to be calm and careful.
”
”
Michael Crichton (Jurassic Park (Jurassic Park, #1))
“
On Earth, social networking generally involved sitting down at a nonsentient computer and typing words about needing a coffee and reading about other people needing a coffee, while forgetting to actually make a coffee.
”
”
Matt Haig (The Humans)
“
Face-book has all the social graces of a nose-picking, hyperactive six-year-old, standing at the threshold of your attention and chanting, “I know something, I know something, I know something, won’t tell you what it is!
”
”
Cory Doctorow (Content: Selected Essays on Technology, Creativity, Copyright, and the Future of the Future)
“
Everything we do at Mayflower-Plymouth is viewed through the lens of capital allocation. Whether it's Blockchain or Quantum Computing or DeFi or Additive Manufacturing or Logistics, we channel that toward helping businesses fulfill solutions and solve problems concerning the allocation of capital.
”
”
Hendrith Vanlon Smith Jr. (Business Essentials)
“
try to inspire them to consider the power and implications of such potential. I tell them that no computer network on earth can come close to the capacity of the average human brain. This resource that each one of us has is a tremendous gift from God—the most complex organ system in the entire universe.
”
”
Ben Carson (Take the Risk: Learning to Identify, Choose, and Live with Acceptable Risk)
“
For Adamatzky, the point of fungal computers is not to replace silicon chips. Fungal reactions are too slow for that. Rather, he thinks humans could use mycelium growing in an ecosystem as a “large-scale environmental sensor.” Fungal networks, he reasons, are monitoring a large number of data streams as part of their everyday existence. If we could plug into mycelial networks and interpret the signals they use to process information, we could learn more about what was happening in an ecosystem.
”
”
Merlin Sheldrake (Entangled Life: How Fungi Make Our Worlds, Change Our Minds & Shape Our Futures)
“
When a printed book—whether a recently published scholarly history or a two-hundred-year-old Victorian novel—is transferred to an electronic device connected to the Internet, it turns into something very like a Web site. Its words become wrapped in all the distractions of the networked computer. Its links and other digital enhancements propel the reader hither and yon. It loses what the late John Updike called its “edges” and dissolves into the vast, rolling waters of the Net. The linearity of the printed book is shattered, along with the calm attentiveness it encourages in the reader.
”
”
Nicholas Carr (What the Internet is Doing to Our Brains)
“
Just as combining the steam engine with ingenious machinery drove the Industrial Revolution, the combination of the computer and distributed networks led to a digital revolution that allowed anyone to create, disseminate, and access any information anywhere.
”
”
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses and Geeks Created the Digital Revolution)
“
Diana: Theo, if you had access to one of those computers, could you find a way to, I don't know--
Theo: Infiltrate Jason's network and decimate his data stores, corrupting every bit of information he's gathered and rendering his research worthless?
Diana: Um, yes that.
”
”
Leigh Bardugo (Wonder Woman: Warbringer)
“
The world needs more love and Twitter just figured out a way to send 'hearts all over the world'.
”
”
Germany Kent
“
Some viruses don’t actually harm the system itself, but all of them cause network slowdowns due to the heavy network traffic caused by the virus replication
”
”
Chuck Easttom (Computer Security Fundamentals)
“
Pigpen taught me how to upload code from the internet and how to get it on people's computers and phones so I have a back door to their network.
”
”
Katie McGarry (Walk the Edge (Thunder Road, #2))
“
the Democratic National Committee and its cyber response team publicly announced that Russian hackers had compromised its computer network.
”
”
Robert S. Mueller III (The Mueller Report: Report on the Investigation into Russian Interference in the 2016 Presidential Election)
“
As a result, we receive panicked calls from police chiefs, government ministers, members of the aristocracy, military officers, councillors, intelligence agents, churchmen, surgeons, diplomats, hospital administrators, etc. We also have people placed in key organizations who keep us abreast of significant developments. Still, despite all these connections, we maintain our secrecy. Our name does not appear on any piece of paper outside of our organization. In fact, very few on the outside know that we exist. People are given a phone number to call, and information comes to us through twisty channels. Our computer network is not connected to any external system. If you try to track us down, you will not find us, but we will find you.
”
”
Daniel O'Malley (The Rook (The Checquy Files, #1))
“
If “piracy” means using value from someone else’s creative property without permission from that creator–as it is increasingly described today – then every industry affected by copyright today is the product and beneficiary of a certain kind of piracy. Film, records, radio, cable TV… Extremists in this debate love to say “You wouldn’t go into Barnes & Noble and take a book off of the shelf without paying; why should it be any different with online music?” The difference is, of course, that when you take a book from Barnes & Noble, it has one less book to sell. By contrast, when you take an MP3 from a computer network, there is not one less CD that can be sold. The physics of piracy of the intangible are different from the physics of piracy of the tangible.
”
”
Lawrence Lessig (Free Culture: The Nature and Future of Creativity)
“
Is a mind a complicated kind of abstract pattern that develops in an underlying physical substrate, such as a vast network of nerve cells? If so, could something else be substituted for the nerve cells – something such as ants, giving rise to an ant colony that thinks as a whole and has an identity – that is to say, a self? Or could something else be substituted for the tiny nerve cells, such as millions of small computational units made of arrays of transistors, giving rise to an artificial neural network with a conscious mind? Or could software simulating such richly interconnected computational units be substituted, giving rise to a conventional computer (necessarily a far faster and more capacious one than we have ever seen) endowed with a mind and a soul and free will?
”
”
Andrew Hodges (Alan Turing: The Enigma)
“
A speech with magical force. Nowadays, people don't believe in these kinds of things. Except in the Metaverse, that is, where magic is possible. The Metaverse is a fictional structure made out of code. And code is just a form of speech—the form that computers understand. The Metaverse in its entirety could be considered a single vast nam-shub, enacting itself on L. Bob Rife's fiber-optic network.
”
”
Neal Stephenson (Snow Crash)
“
What was often difficult for people to understand about the design was that there was nothing else beyond URLs, HTTP and HTML. There was no central computer "controlling" the Web, no single network on which these protocols worked, not even organisation anywhere that "ran" the Web. The Web was not a physical "thing" that existed in a certain "place". It was a "space" in which information could exist.
”
”
Tim Berners-Lee
“
In my view, it is an error to think about 'alternatives to prison' if what we mean by that is 'electronic bracelets,' through which people are subject to computer-monitored house arrest, or granting fuller surveillance and disciplinary powers and technologies to other state agencies, such as welfare and mental health, through 'transcarceration' policies...We need to decrease, not increase, the means by which the state, in its multifarious networks of authority, controls human lives and selectively incapacitates people who, no less than others, have the potential to contribute to the improvement of hte human condition.
”
”
Karlene Faith (Unruly Women: The Politics of Confinement & Resistance)
“
The essential difference between rich societies and poor societies does not stem from any greater effort the former devote to work, nor even from any greater technological knowledge the former hold. Instead it arises mainly from the fact that rich nations possess a more extensive network of capital goods wisely invested from an entrepreneurial standpoint. These goods consists of machines, tools, computers, buildings, semi-manufactured goods, software, etc., and they exist due to prior savings of the nation's citizens. In other words, comparatively rich societies possess more wealth because they have more time accumulated in the form of capital goods, which places them closer in time to the achievement of much more valuable goals.
”
”
Jesús Huerta de Soto
“
The openness of such networked devices reflects our growing desire to construct writing in a way that breaks down the traditional distinctions between the book and such larger forms as the encyclopedia and the library.
”
”
Jay David Bolter (Writing Space: Computers, Hypertext, and the Remediation of Print)
“
What, exactly, is the Internet? Basically it is a global network exchanging digitized data in such a way that any computer, anywhere, that is equipped with a device called a “modem” can make a noise like a duck choking on a kazoo.
”
”
Dave Barry
“
Google gets $59 billion, and you get free search and e-mail. A study published by the Wall Street Journal in advance of Facebook’s initial public offering estimated the value of each long-term Facebook user to be $80.95 to the company. Your friendships were worth sixty-two cents each and your profile page $1,800. A business Web page and its associated ad revenue were worth approximately $3.1 million to the social network. Viewed another way, Facebook’s billion-plus users, each dutifully typing in status updates, detailing his biography, and uploading photograph after photograph, have become the largest unpaid workforce in history. As a result of their free labor, Facebook has a market cap of $182 billion, and its founder, Mark Zuckerberg, has a personal net worth of $33 billion. What did you get out of the deal? As the computer scientist Jaron Lanier reminds us, a company such as Instagram—which Facebook bought in 2012—was not valued at $1 billion because its thirteen employees were so “extraordinary. Instead, its value comes from the millions of users who contribute to the network without being paid for it.” Its inventory is personal data—yours and mine—which it sells over and over again to parties unknown around the world. In short, you’re a cheap date.
”
”
Marc Goodman (Future Crimes)
“
All the computers in the world are on a network. They’re linked by our cuffs. But I’m a computer. Jack’s a computer—Akilah—PA Young—all the cy-clones. We’re all computers.
You know the great thing about computers?
They can be hacked.
”
”
Beth Revis (The Body Electric)
“
The reason knowledge workers are losing their familiarity with deep work is well established: network tools. This is a broad category that captures communication services like e-mail and SMS, social media networks like Twitter and Facebook, and the shiny tangle of infotainment sites like BuzzFeed and Reddit. In aggregate, the rise of these tools, combined with ubiquitous access to them through smartphones and networked office computers, has fragmented most knowledge workers’ attention into slivers.
”
”
Cal Newport (Deep Work: Rules for Focused Success in a Distracted World)
“
Regular users know nothing about program languages or varying exchange protocols. They just want the thing to run. So Microsoft invented a way to bundle executable programs and data, the DLL, that allows them to be smoothly exchanged by computers on different networks.
”
”
Mark Bowden (Worm: The First Digital World War)
“
Under a $652-million clandestine program code named GENIE, the NSA, CIA, and special military operatives have planted covert digital bugs in tens of thousands of computers, routers, and firewalls around the world to conduct computer network exploitation, or CNE. Some are planted remotely, but others require physical access to install through so-called interdiction—the CIA or FBI intercepts shipments of hardware from manufacturers and retailers in order to plant malware in them or install doctored chips before they reach the customer.
”
”
Kim Zetter (Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon)
“
And there was a wonderful thing that tended to happen, something that felt like poetic justice: every time someone started shouting about the supposed monopoly of the Circle, or the Circle’s unfair monetization of the personal data of its users, or some other paranoid and demonstrably false claim, soon enough it was revealed that that person was a criminal or deviant of the highest order. One was connected to a terror network in Iran. One was a buyer of child porn. Every time, it seemed, they would end up on the news, footage of investigators leaving their homes with computers, on which any number of unspeakable searches had been executed and where reams of illegal and inappropriate materials were stored. And it made sense. Who but a fringe character would try to impede the unimpeachable improvement of the world?
”
”
Dave Eggers (The Circle (The Circle, #1))
“
Yet once biologists concluded that organisms are algorithms, they dismantled the wall between the organic and the inorganic, turned the computer revolution from a purely mechanical affair into a biological cataclysm, and shifted authority from individual humans to networked algorithms.
”
”
Yuval Noah Harari (Homo Deus: A History of Tomorrow)
“
We have more computing power in the drop ships’ tactical integrated neural network computers than existed on the entire planet fifty years ago, and somehow mission planning goes better when you’re outside in the fresh air and drawing diagrams and maps into the dirt with a pointy stick. “Two
”
”
Marko Kloos (Chains of Command (Frontlines, #4))
“
As human beings, we live by emotions and thoughts. We exchange them when we are in the same place at the same time, talking to each other, looking into each other’s eyes, brushing against each other’s skin. We are nourished by this network of encounters and exchanges. But, in reality, we do not need to be in the same place and time to have such exchanges. Thoughts and emotions that create bonds of attachment between us have no difficulty in crossing seas and decades, sometimes even centuries, tied to thin sheets of paper or dancing between the microchips of a computer. We are part of a network that goes far beyond the few days of our lives and the few square meters that we tread. This book is also a part of that weave. . .
”
”
Carlo Rovelli (The Order of Time)
“
Over the next three decades, scholars and fans, aided by computational algorithms, will knit together the books of the world into a single networked literature. A reader will be able to generate a social graph of an idea, or a timeline of a concept, or a networked map of influence for any notion in the library. We’ll come to understand that no work, no idea stands alone, but that all good, true, and beautiful things are ecosystems of intertwined parts and related entities, past and present.
”
”
Kevin Kelly (The Inevitable: Understanding the 12 Technological Forces That Will Shape Our Future)
“
Today the most serious computer predators are funded by rich criminal syndicates and even nation-states, and their goals are far more ambitious. Cyberattacks were launched at digital networks in Estonia by ethnic Russian protesters in 2007 and in Georgia before Russia attacked that country in 2008; and someone, probably Israel or the United States (or both), successfully loosed a worm called Stuxnet in 2010 to sabotage computer-controlled uranium centrifuges inside Iran’s secretive nuclear program.
”
”
Mark Bowden (Worm: The First Digital World War)
“
If ever I create a website, I'll call it Two-Face Book, and I'll invite everyone to it, it will be a game board, of a whitewash chalkboard.
A social network, with reserved intentions, where we can fall into our cliques and circle of friends. We can dis who we want and accept who appeals to our discretion. Where the users will keep abusing, and abusers keep using, where the computer bullies will keep swinging and the J-birds that fly by will die; where the lonely will keep seeking and the needy still go desperate, where the envious will keep hating, and the lustful will keep flashing. Where those that think ignoring, will keep one down and the wannabes will foolishly think themselves greater by the number of "likes" that pours caffeine into their coffee. We can jump on the bandwagon of likes, or reserve not to show we care. Where the scorners, scammers and stalkers lay wait to take hold of the innocent and fragile, and my pockets will get fatter as more and more will join up, where being fake is accepted. As a mirror that stares at a different face. It will be my two-face epilogue, in a 3-world dimension, of a twofold war. I will build an empire of contagious hooks, and still we will live, happily-ever disastrous.
”
”
Anthony Liccione
“
It's proper Netiquette to view in-App webpages in a mobile browser for better security. NetworkEtiquette.net
”
”
David Chiles
“
The second reason that deep work is valuable is because the impacts of the digital network revolution cut both ways. If you can create something useful, its reachable audience (e.g., employers or customers) is essentially limitless—which greatly magnifies your reward. On the other hand, if what you’re producing is mediocre, then you’re in trouble, as it’s too easy for your audience to find a better alternative online. Whether you’re a computer programmer, writer, marketer, consultant, or entrepreneur, your situation has become similar to Jung trying to outwit Freud, or Jason Benn trying to hold his own in a hot start-up: To succeed you have to produce the absolute best stuff you’re capable of producing—a task that requires depth.
”
”
Cal Newport (Deep Work: Rules for Focused Success in a Distracted World)
“
Envisioning fungi as nanoconductors in mycocomputers, Gorman (2003) and his fellow researchers at Northwestern University have manipulated mycelia of Aspergillus niger to organize gold into its DNA, in effect creating mycelial conductors of electrical potentials. NASA reports that microbiologists at the University of Tennessee, led by Gary Sayler, have developed a rugged biological computer chip housing bacteria that glow upon sensing pollutants, from heavy metals to PCBs (Miller 2004). Such innovations hint at new microbiotechnologies on the near horizon. Working together, fungal networks and environmentally responsive bacteria could provide us with data about pH, detect nutrients and toxic waste, and even measure biological populations.
”
”
Paul Stamets (Mycelium Running: How Mushrooms Can Help Save the World)
“
The law of computers is the same as the law of the marketplace. The earth's atmosphere was divided up into a network of cubes, each reducible to a collection of points, and each point the product of a set of calculations. As far as science was concerned, this was the end of clouds, which were but a series of coordinates simulated in a space of greater than three dimensions.
”
”
Stéphane Audeguy (The Theory of Clouds)
“
I believe that the mycelium operates at a level of complexity that exceeds the computational powers of our most advanced supercomputers. I see the myce-lium as the Earth’s natural Internet, a consciousness with which we might be able to communicate. Through cross-species interfacing, we may one day exchange information with these sentient cellular networks. Because these externalized neurological nets sense any impression upon them, from footsteps to falling tree branches, they could relay enormous amounts of data regarding the movements of all organisms through the landscape. A new bioneering science could be born, dedicated to programming myconeurological networks to monitor and respond to threats to environments. Mycelial webs could be used as information platforms for mycoengineered ecosystems.
”
”
Paul Stamets (Mycelium Running: How Mushrooms Can Help Save the World)
“
He lamented the attitude of his younger students, who “no longer noticed that their heads had been turned into relays in a telephone network for communicating and distributing sensational physics messages” without realizing that, like almost all modern developments, mathematics was hostile to life: “It is inhuman, like every truly diabolic machine, and it kills everyone whose spinal marrow isn’t conditioned to fit the movement of its wheels.” His already excruciating self-criticism and inferiority complex became truly unbearable, for although he knew mathematics, it was not simple for him. He was not a computer.
”
”
Benjamín Labatut (The Maniac)
“
In 1995, psychiatrist Ivan Goldberg coined the term internet addiction disorder. He wrote a satirical essay about “people abandoning their family obligations to sit gazing into their computer monitor as they surfed the Internet.” Intending to parody society’s obsession with pathologizing everyday behaviors, he inadvertently advanced the idea. Goldberg responded critically when academics began discussing internet addiction as a legitimate disorder: “I don’t think Internet addiction disorder exists any more than tennis addictive disorder, bingo addictive disorder, and TV addictive disorder exist. People can overdo anything. To call it a disorder is an error.
”
”
Danah Boyd (It's Complicated: The Social Lives of Networked Teens)
“
And another question we are asking is: what is going to happen to humanity, to all of us, when the computer outthinks man in accuracy and rapidity—as the computer experts are saying it will? With the development of the robot, man will only have, perhaps, two hours of work a day. This may be going to happen within the foreseeable future. Then what will man do? Is he going to be absorbed in the field of entertainment? That is already taking place: sports are becoming more important; there is the watching of television; and there are the varieties of religious entertainment. Or is he going to turn inwardly, which is not an entertainment but something which demands great capacity of observation, examination and non-personal perception? These are the two possibilities. The basic content of our human consciousness is the pursuit of pleasure and the avoidance of fear. Is humanity increasingly going to follow entertainment?
21st July, 1981
”
”
J. Krishnamurti (The Network Of Thought: Authentic Reports of Talks in 1981 in Saanen, Switzerland and Amsterdam Holland)
“
The NSA had enormous resources and used a vast network in order to capture a large number of mobile conversations in a certain region simultaneously . Each individual call was separated and processed digitally by computers programmed to react to certain words, such as terrorist or Kalashnikov. If such a word occurred, the computer automatically sent an alarm, which meant that some operator would go in manually and listen to the conversation to decide whether it was of interest or not.
”
”
Stieg Larsson (The Girl Who Kicked the Hornet's Nest (Millennium, #3))
“
Niagara made a careful gesture, like some religious benediction: a diagonal slice across his chest and a stab to the heart. ‘A slash and a dot,’ he said. ‘I doubt it means anything to you, but this was once the mark of an alliance of progressive thinkers linked together by one of the very first computer networks. The Federation of Polities can trace its existence right back to that fragile collective, in the early decades of the Void Century. It’s less a stigma than a mark of community.
”
”
Alastair Reynolds (Century Rain)
“
We have proposed a system for electronic transactions without relying on trust. We started with the usual framework of coins made from digital signatures, which provides strong control of ownership, but is incomplete without a way to prevent double-spending. To solve this, we proposed a peer-to-peer network using proof-of-work to record a public history of transactions that quickly becomes computationally impractical for an attacker to change if honest nodes control a majority of CPU power.
”
”
Satoshi Nakamoto
“
Most of the successful innovators and entrepreneurs in this book had one thing in common: they were product people. They cared about, and deeply understood, the engineering and design. They were not primarily marketers or salesmen or financial types; when such folks took over companies, it was often to the detriment of sustained innovation. “When the sales guys run the company, the product guys don’t matter so much, and a lot of them just turn off,” Jobs said. Larry Page felt the same: “The best leaders are those with the deepest understanding of the engineering and product design.”34 Another lesson of the digital age is as old as Aristotle: “Man is a social animal.” What else could explain CB and ham radios or their successors, such as WhatsApp and Twitter? Almost every digital tool, whether designed for it or not, was commandeered by humans for a social purpose: to create communities, facilitate communication, collaborate on projects, and enable social networking. Even the personal computer, which was originally embraced as a tool for individual creativity, inevitably led to the rise of modems, online services, and eventually Facebook, Flickr, and Foursquare. Machines, by contrast, are not social animals. They don’t join Facebook of their own volition nor seek companionship for its own sake. When Alan Turing asserted that machines would someday behave like humans, his critics countered that they would never be able to show affection or crave intimacy. To indulge Turing, perhaps we could program a machine to feign affection and pretend to seek intimacy, just as humans sometimes do. But Turing, more than almost anyone, would probably know the difference. According to the second part of Aristotle’s quote, the nonsocial nature of computers suggests that they are “either a beast or a god.” Actually, they are neither. Despite all of the proclamations of artificial intelligence engineers and Internet sociologists, digital tools have no personalities, intentions, or desires. They are what we make of them.
”
”
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
“
Stop for a second to behold the miracle of engineering that these hand-held, networked computers represent—the typical CPU in a modern smartphone is ten times more powerful than the Cray-1 supercomputer installed at Los Alamos National Laboratory in 1976.
”
”
Anthony M. Townsend (Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia)
“
I turn on my computer to search Craigslist for apartment listings. The wireless window pops up, and I realize with some regret that all I know about my neighbours is their wireless network names: Krypton, Space balls, Couscous, and Scarlet. From this I can tell little else than that they're fans of Superman, Mel Brooks, Middle Eastern cuisine, and the colour red. I look out my window, wondering whose house is whose and what private food and entertainment consumption occurs in each and how I will never get to know.
”
”
Jonathan Goldstein (I'll Seize the Day Tomorrow)
“
What we are facing is not the replacement of millions of individual human workers by millions of individual robots and computers; rather, individual humans are likely to be replaced by an integrated network. When considering automation, therefore, it is wrong to compare the abilities of a single human driver to that of a single self-driving car, or of a single human doctor to that of a single AI doctor. Rather, we should compare the abilities of a collection of human individuals to the abilities of an integrated network.
”
”
Yuval Noah Harari (21 Lessons for the 21st Century)
“
generic definition of a blockchain: a distributed, append-only ledger of provably signed, sequentially linked, and cryptographically secured transactions that’s replicated across a network of computer nodes, with ongoing updates determined by a software-driven consensus.
”
”
Michael J. Casey (The Truth Machine: The Blockchain and the Future of Everything)
“
Every computing device today has five basic components: (1) the integrated circuits that do the computing; (2) the memory units that store and retrieve information; (3) the networking systems that enable communications within and across computers; (4) the software applications that enable different computers to perform myriad tasks individually and collectively; and (5) the sensors—cameras and other miniature devices that can detect movement, language, light, heat, moisture, and sound and transform any of them into digitized data that can be mined for insights.
”
”
Thomas L. Friedman (Thank You for Being Late: An Optimist's Guide to Thriving in the Age of Accelerations)
“
The company that employed me strived only to serve up the cheapest fare that its customers would tolerate, churn it out as fast as possible, and charge as much as they could get away with. If it were possible to do so, the company would sell what all businesses of its kind dream about selling, creating that which all our efforts were tacitly supposed to achieve: the ultimate product – Nothing. And for this product they would command the ultimate price – Everything. This market strategy would then go on until one day, among the world-wide ruins of derelict factories and warehouses and office buildings, there stood only a single, shining, windowless structure with no entrance and no exit. Inside would be – will be – only a dense network of computers calculating profits. Outside will be tribes of savage vagrants with no comprehension of the nature or purpose of the shining, windowless structure. Perhaps they will worship it as a god. Perhaps they will try to destroy it, their primitive armory proving wholly ineffectual against the smooth and impervious walls of the structure, upon which not even a scratch can be inflicted.
”
”
Thomas Ligotti (My Work is Not Yet Done: Three Tales of Corporate Horror)
“
Human beings were never meant to participate in a worldwide social network comprised of billions of people. We were designed by evolution to be hunter-gatherers, with the mental capacity to interact and socialize with the other members of our tribe—a tribe made up of a few hundred other people at most. Interacting with thousands or even millions of other people on a daily basis was way too much for our ape-descended melons to handle. That was why social media had been gradually driving the entire population of the world insane since it emerged back around the turn of the century. I was even beginning to wonder if the invention of a worldwide social network was actually the “Great Filter” that theoretically caused all technological civilizations to go extinct, instead of nuclear weapons or climate change. Maybe every time an intelligent species grew advanced enough to invent a global computer network, they would then develop some form of social media, which would immediately fill these beings with such an intense hatred for one another that they ended up wiping themselves out within four or five decades. Only time would tell.
”
”
Ernest Cline (Ready Player Two (Ready Player One #2))
“
Given that background, I was interested in what Steve Jobs might say about the future of Apple. His survival strategy for Apple, for all its skill and drama, was not going to propel Apple into the future. At that moment in time, Apple had less than 4 percent of the personal computer market. The de facto standard was Windows-Intel and there seemed to be no way for Apple to do more than just hang on to a tiny niche. In the summer of 1998, I got an opportunity to talk with Jobs again. I said, “Steve, this turnaround at Apple has been impressive. But everything we know about the PC business says that Apple cannot really push beyond a small niche position. The network effects are just too strong to upset the Wintel standard. So what are you trying to do in the longer term? What is the strategy?” He did not attack my argument. He didn’t agree with it, either. He just smiled and said, “I am going to wait for the next big thing.
”
”
Richard P. Rumelt (Good Strategy Bad Strategy: The Difference and Why It Matters)
“
I greet you jar of jam. You glass who once was sand upon the beach, Washed back and forth and bathed in foam and seagull cries, but who are formed into a glass until you once again return to the sea... I hardly give the computer a second glance. I can muster no reflective moment for plastic. It is so far removed from the natural world. I wonder if that's a place where the disconnection began, the loss of respect, when we could no longer easily see the life within the object. And yet I mean no disrespect for the diatoms and the marine invertebrates who two hundred million years ago lived well and fell to the bottom of an ancient sea, where under great pressure of a shifting earth they became oil that was pumped from the ground to a refinery where it was broken down and then polymerized to make the case of my laptop or the cap of the aspirin bottle- but being mindful in the vast network of hyperindustrialized goods really gives me a headache. We weren't made for that sort of constant awareness. We've got work to do.
”
”
Robin Wall Kimmerer (Braiding Sweetgrass: Indigenous Wisdom, Scientific Knowledge, and the Teachings of Plants)
“
It seems perverse that we can be more social than anyone would have thought possible when we are at our most anti-social, locked away from the world and silently staring at a computer screen, but that, as psychologists will tell you is the way we operate. When we are at the maximum of our disconnect we also are ready to connect and feel the need for interaction.
”
”
David Amerland (The Social Media Mind: How social media how social media is changing business, politics and science and helps create a new world order.)
“
Exoteric machines - esoteric machines.
They say the computer is an improved form of typewriter. Not a bit of it. I collude with my typewriter, but the relationship is otherwise clear and distant. I know it is a machine; it knows it is a machine. There is nothing here of the interface, verging on biological confusion, between a computer thinking it is a brain and me thinking I am a computer.
The same familiarity with good old television, where I was and remained a spectator. It was an esoteric machine, whose status as machine I respected. Nothing there of all these screens and interactive devices, including the 'smart' car of the future and the 'smart' house. Even the mobile phone, that incrustation of the network in your head, even the skateboard and rollerblades - mobility aids - are of a quite different generation from the good old static telephone or the velocipedic machine. New manners and a new morality are emerging as a result of this organic confusion between man and his prostheses - a confusion which puts an end to the instrumental pact and the integrity of the machine itself.
”
”
Jean Baudrillard (Cool Memories IV, 1995-2000)
“
Unlike Davies, he didn't have to work through the British Postal Service. And unlike Baran, he didn't have to work through the Defense Communications Agency. Roberts was backed by ARPA, whose whole reason for existing was to cut through the bureaucracy. His bosses were giving him a free hand. And he meant to exercise that freedom. He meant to get this network ready to
”
”
M. Mitchell Waldrop (The Dream Machine: J. C. R. Licklider and the Revolution That Made Computing Personal)
“
Since humans are individuals, it is difficult to connect them to one another and to make sure that they are all up to date. In contrast, computers aren’t individuals, and it is easy to integrate them into a single flexible network. What we are facing is not the replacement of millions of individual human workers by millions of individual robots and computers; rather, individual humans are likely to be replaced by an integrated network. When considering automation, therefore, it is wrong to compare the abilities of a single human driver to that of a single self-driving car, or of a single human doctor to that of a single AI doctor. Rather, we should compare the abilities of a collection of human individuals to the abilities of an integrated network.
”
”
Yuval Noah Harari (21 Lessons for the 21st Century)
“
Is a mind a complicated kind of abstract pattern that develops in an underlying physical substrate, such as a vast network of nerve cells? If so, could something else be substituted for the nerve cells – something such as ants, giving rise to an ant colony that thinks as a whole and has an identity – that is to say, a self? Or could something else be substituted for the tiny nerve cells, such as millions of small computational units made of arrays of transistors, giving rise to an artificial neural network with a conscious mind? Or could software simulating such richly interconnected computational units be substituted, giving rise to a conventional computer (necessarily a far faster and more capacious one than we have ever seen) endowed with a mind and a soul and free will? In short, can thinking and feeling emerge from patterns
”
”
Andrew Hodges (Alan Turing: The Enigma)
“
Like gamblers, baseball fans and television networks, fishermen are enamored of statistics. The adoration of statistics is a trait so deeply embedded in their nature that even those rarefied anglers the disciples of Jesus couldn't resist backing their yarns with arithmetic: when the resurrected Christ appears on the morning shore of the Sea of Galilee and directs his forlorn and skunked disciples to the famous catch of John 21, we learn that the net contained not "a boatload" of fish, nor "about a hundred and a half," nor "over a gross," but precisely "a hundred and fifty three." This is, it seems to me, one of the most remarkable statistics ever computed. Consider the circumstances: this is after the Crucifixion and the Resurrection; Jesus is standing on the beach newly risen from the dead, and it is only the third time the disciples have seen him since the nightmare of Calvary. And yet we learn that in the net there were "great fishes" numbering precisely "a hundred and fifty three." How was this digit discovered? Mustn't it have happened thus: upon hauling the net to shore, the disciples squatted down by that immense, writhing fish pile and started tossing them into a second pile, painstakingly counting "one, two, three, four, five, six, seven... " all the way up to a hundred and fifty three, while the newly risen Lord of Creation, the Sustainer of all their beings, He who died for them and for Whom they would gladly die, stood waiting, ignored, till the heap of fish was quantified. Such is the fisherman's compulsion toward rudimentary mathematics!
....Concerning those disciples huddled over the pile of fish, another possibility occurs to me: perhaps they paid the fish no heed. Perhaps they stood in a circle adoring their Lord while He, the All-Curious Son of His All-Knowing Dad, counted them all Himself!
”
”
David James Duncan (The River Why)
“
In this way the extortion game is similar to the economics of sending spam e-mail. When receiving an e-mail promising a share of a lost Nigerian inheritance or cheap Viagra, nearly everyone clicks delete. But a tiny number takes the bait. Computer scientists at the University of California–Berkeley and UC–San Diego hijacked a working spam network to see how the business operated. They found that the spammers, who were selling fake “herbal aphrodisiacs,” made only one sale for every 12.5 million e-mails they sent: a response rate of 0.00001 percent. Each sale was worth an average of less than $100. It doesn’t look like much of a business. But sending out the e-mails was so cheap and easy—it was done using a network of hijacked PCs, which the fraudsters used free of charge—that the spammers made a healthy profit. Pumping out hundreds of millions of e-mails a day, they had a daily income of about $7,000, or more than $2.5 million a year, the researchers figured.3
”
”
Tom Wainwright (Narconomics: How to Run a Drug Cartel)
“
One day in September 2015, FBI agent Adrian Hawkins placed a call to the Democratic National Committee headquarters in Washington, D.C., and asked to speak to the person in charge of technology. He was routed to the DNC help desk, which transferred the call to Yared Tamene, a young IT specialist with The MIS Department, a consulting firm hired by the DNC. After identifying himself, Hawkins told Tamene that he had reason to believe that at least one computer on the DNC’s network was compromised. He asked if the DNC was aware of this and what it was doing. Tamene had nothing to do with cybersecurity and knew little about the subject. He was a mid-level network administrator; his basic IT duties for the DNC were to set up computer accounts for employees and be on call to deal with any problems. When he got the call, Tamene was wary. Was this a joke or, worse, a dirty trick? He asked Hawkins if he could prove he was an FBI agent, and, as Tamene later wrote in a memo, “he did not provide me with an adequate response.… At this point, I had no way of differentiating the call I received from a prank call.” Hawkins, though, was real. He was a well-regarded agent in the FBI’s cyber squad. And he was following a legitimate lead in a case that would come to affect a presidential election. Earlier in the year, U.S. cyber warriors intercepted a target list of about thirty U.S. government agencies, think tanks, and several political organizations designated for cyberattacks by a group of hackers known as APT 29. APT stood for Advanced Persistent Threat—technojargon for a sophisticated set of actors who penetrate networks, insert viruses, and extract data over prolonged periods of time.
”
”
Michael Isikoff (Russian Roulette: The Inside Story of Putin's War on America and the Election of Donald Trump)
“
It was the combination of EC2 and S3 - storage and compute, two primitives linked together - that transformed both AWS and the technology world. Startups no longer needed to spend their venture capital on buying servers and hiring specialized engineers to run them. Infrastructure costs were variable instead of fixed, and they could grow in direct proportion to revenues. It freed companies to experiment, to change their business models with a minimum of pain, and to keep up with the rapidly growing audiences of erupting social networks like Facebook and Twitter.
”
”
Brad Stone (The Everything Store: Jeff Bezos and the Age of Amazon)
“
It was thus that in the second half of 1969—amid the static of Woodstock, Chappaquiddick, Vietnam War protests, Charles Manson, the Chicago Eight trial, and Altamont—the culmination was reached for three historic enterprises, each in the making for almost a decade. NASA was able to send a man to the moon. Engineers in Silicon Valley were able to devise a way to put a programmable computer on a chip called a microprocessor. And ARPA created a network that could connect distant computers. Only the first of these (perhaps the least historically significant of them?) made headlines. THE
”
”
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
“
Communism was a distinct possibility until the coup of 1989’.2 Yet it was obvious to any attentive visitor to the Soviet Union that something was amiss with the planned economy. Consumer goods were of dismal quality and in chronically short supply. In antiquated factories, pilfering, alcohol abuse and absenteeism were rife. It is hard to believe that any amount of computing power would have saved such a fundamentally flawed system. For the majority of Soviet citizens, the resulting mood of demoralization did not translate into political activity – just into fatalism and yet more black humour.
”
”
Niall Ferguson (The Square and the Tower: Networks and Power, from the Freemasons to Facebook)
“
In theory, if some holy book misrepresented reality, its disciples would sooner or later discover this, and the text’s authority would be undermined. Abraham Lincoln said you cannot deceive everybody all the time. Well, that’s wishful thinking. In practice, the power of human cooperation networks depends on a delicate balance between truth and fiction. If you distort reality too much, it will weaken you, and you will not be able to compete against more clear-sighted rivals. On the other hand, you cannot organise masses of people effectively without relying on some fictional myths. So if you stick to unalloyed reality, without mixing any fiction with it, few people will follow you. If you used a time machine to send a modern scientist to ancient Egypt, she would not be able to seize power by exposing the fictions of the local priests and lecturing the peasants on evolution, relativity and quantum physics. Of course, if our scientist could use her knowledge in order to produce a few rifles and artillery pieces, she could gain a huge advantage over pharaoh and the crocodile god Sobek. Yet in order to mine iron ore, build blast furnaces and manufacture gunpowder the scientist would need a lot of hard-working peasants. Do you really think she could inspire them by explaining that energy divided by mass equals the speed of light squared? If you happen to think so, you are welcome to travel to present-day Afghanistan or Syria and try your luck. Really powerful human organisations – such as pharaonic Egypt, the European empires and the modern school system – are not necessarily clear-sighted. Much of their power rests on their ability to force their fictional beliefs on a submissive reality. That’s the whole idea of money, for example. The government makes worthless pieces of paper, declares them to be valuable and then uses them to compute the value of everything else. The government has the power to force citizens to pay taxes using these pieces of paper, so the citizens have no choice but to get their hands on at least some of them. Consequently, these bills really do become valuable, the government officials are vindicated in their beliefs, and since the government controls the issuing of paper money, its power grows. If somebody protests that ‘These are just worthless pieces of paper!’ and behaves as if they are only pieces of paper, he won’t get very far in life.
”
”
Yuval Noah Harari (Homo Deus: A History of Tomorrow)
“
Getting Started
Setting up your Kindle Oasis
Kindle controls
Status indicators
Keyboard
Network connectivity
VoiceView screen reader
Special Offers and Sponsored Screensavers
Chapter 2
Navigating Your Kindle
The Kindle Home screen
Toolbars
Tap zones
Chapter 3
Acquiring & Managing Kindle Content
Shop for Kindle and Audible content anytime, anywhere
Recommended content
Managing your Kindle Library
Device and Cloud storage
Removing items from your Kindle
Chapter 4
Reading Kindle Documents
Understanding Kindle display technology
Customizing your text display
Comic books
Children's books
Images
Tables
Interacting with your content
Navigating a book
Chapter 5
Playing Audible Books
Pairing a Bluetooth audio device
Using the Audible Player
Audiobook bookmarks
Downloading Audible books
Audiobook Library Management
Chapter 6
Features
X-Ray
Word Wise
Vocabulary Builder
Amazon FreeTime (Amazon Fire for Kids in the UK)
Managing your Amazon Household
Goodreads on Kindle
Time to Read
Chapter 7
Getting More from Your Kindle Oasis
Carrying and reading personal documents
Reading Kindle content on other devices
Sharing
Using your Kindle with your computer
Using the Experimental Web Browser
Chapter 8
Settings
Customizing your Kindle settings
The Settings contextual menu
Chapter 9
Finding Additional Assistance
Appendix A
Product Information
”
”
Amazon (Kindle Oasis User's Guide)
“
Why do you hate the idea of being with yourself so much that ‘the time you spend with yourself is now considered as loneliness
Why we fear loneliness. The fear of loneliness was injected into our minds since we were kids. We have learned that the kid who eats alone, sits alone, and has no friends is pathetic. In every book or movie, the kid who is eating alone, and has no friend is always featured as a weak character who needs to be saved.
It’s not pathetic to be alone. I realized that we don’t hate being alone. We hate to believe that we are left behind.
Being alone is a part of life. But being lonely means viewing yourself from the lens of sympathy and misery. When you look at yourself through the lens of loneliness, you feel insecure and left out.
Being alone doesn’t mean you are lonely. Being alone means YOU ARE WITH YOURSELF.
Stop romanticizing your life , one day someone will come to save you, rescue you, or rather fall in love with you. The problem with this is that you CHOOSE to believe that YOU ARE NOT ENOUGH to change your life all by yourself. You rely your hope on someone who doesn’t exist.
After college, you don’t make friends. You just network. You just try to be nice to people so you are not left behind (mostly).
We don’t want people to think that no one chose us so what do we do? We start becoming like an ideal version of whom everyone loves. We start saying YES to things that we hate. But step by step, as we become like everyone else, we go far away from who we truly are.
Loneliness is not when you don’t have people around. Loneliness occurs when you cannot find yourself inside you. The moment you feel the loss of your real self, that’s when loneliness makes a home inside you.
“There are some days when you miss yourself more than you have ever missed anyone else.
Solitude is my home , Loneliness was my cage.
Imagine Yourself as a computer and see how you have opened different tabs of your personality for each person you meet. New person, new tab. Perhaps, that's the reason your real personality has crashed.
”
”
Renuka Gavrani
“
Because if you make me do that, I will make a stink that you'll never get off your shiny suits. I will sue the network. I will sue the studio. I will sue each one of you personally. I will send our beloved sponsors blogs that claim you' - she pointed to the white man and the black man - 'enjoy having monkey sex on the office furniture while she' - now she pointed to the Asian woman - 'likes to watch and spank herself. Is it true? Well, it will be in a blog. Several blogs, in fact. Then I'll go to other computers and add comments, stuff like Montague likes it rough or with toy or small farm animals. Get PETA on your ass. Then I'll send those blogs to your families. Do you get the drift?
”
”
Harlan Coben
“
He postulated that many neurons can combine into a coalition, becoming a single processing unit. The connection patterns of these units, which can change, make up the algorithms (which can also change with the changing connection patterns) that determine the brain’s response to a stimulus. From this idea came the mantra “Cells that fire together wire together.” According to this theory, learning has a biological basis in the “wiring” patterns of neurons. Hebb noted that the brain is active all the time, not just when stimulated; inputs from the outside can only modify that ongoing activity. Hebb’s proposal made sense to those designing artificial neural networks, and it was put to use in computer programs.
”
”
Michael S. Gazzaniga (The Consciousness Instinct: Unraveling the Mystery of How the Brain Makes the Mind)
“
By tracing the early history of USCYBERCOM it is possible to understand some of the reasons why the military has focused almost completely on network defense and cyber attack while being unaware of the need to address the vulnerabilities in systems that could be exploited in future conflicts against technologically capable adversaries. It is a problem mirrored in most organizations. The network security staff are separate from the endpoint security staff who manage desktops through patch and vulnerability management tools and ensure that software and anti-virus signatures are up to date. Meanwhile, the development teams that create new applications, web services, and digital business ventures, work completely on their own with little concern for security. The analogous behavior observed in the military is the creation of new weapons systems, ISR platforms, precision targeting, and C2 capabilities without ensuring that they are resistant to the types of attacks that USCYBERCOM and the NSA have been researching and deploying. USCYBERCOM had its genesis in NCW thinking. First the military worked to participate in the information revolution by joining their networks together. Then it recognized the need for protecting those networks, now deemed cyberspace. The concept that a strong defense requires a strong offense, carried over from missile defense and Cold War strategies, led to a focus on network attack and less emphasis on improving resiliency of computing platforms and weapons systems.
”
”
Richard Stiennon (There Will Be Cyberwar: How The Move To Network-Centric Warfighting Has Set The Stage For Cyberwar)
“
It’s All about Scaling Most of the current learning algorithms were discovered more than twenty-five years ago, so why did it take so long for them to have an impact on the real world? With the computers and labeled data that were available to researchers in the 1980s, it was only possible to demonstrate proof of principle on toy problems. Despite some promising results, we did not know how well network learning and performance would scale as the number of units and connections increased to match the complexity of real-world problems. Most algorithms in AI scale badly and never went beyond solving toy problems. We now know that neural network learning scales well and that performance continues to increase with the size of the network and the number of layers. Backprop, in particular, scales extremely well. Should we be surprised? The cerebral cortex is a mammalian invention that mushroomed in primates and especially in humans. And as it expanded, more capacity became available and more layers were added in association areas for higher-order representations. There are few complex systems that scale this well. The Internet is one of the few engineered systems whose size has also been scaled up by a million times. The Internet evolved once the protocols were established for communicating packets, much like the genetic code for DNA made it possible for cells to evolve. Training many deep learning networks with the same set of data results in a large number of different networks that have roughly the same average level of performance.
”
”
Terrence J. Sejnowski (The Deep Learning Revolution (The MIT Press))
“
Scalable Social Network Analysis. The SSNA would monitor telephone calls, conference calls, and ATM withdrawals, but it also sought to develop a far more invasive surveillance technology, one that could “capture human activities in surveillance environments.” The Activity Recognition and Monitoring program, or ARM, was modeled after England’s CCTV camera. Surveillance cameras would be set up across the nation, and through the ARM program, they would capture images of people as they went about their daily lives, then save these images to massive data storage banks for computers to examine. Using state-of-the-art facial recognition software, ARM would seek to identify who was behaving outside the computer’s pre-programmed threshold for “ordinary.” The parameters for “ordinary” remain classified.
”
”
Annie Jacobsen (The Pentagon's Brain: An Uncensored History of DARPA, America's Top-Secret Military Research Agency)
“
In the longer term, by bringing together enough data and enough computing power, the data giants could hack the deepest secrets of life, and then use this knowledge not just to make choices for us or manipulate us but also to reengineer organic life and create inorganic life-forms. Selling advertisements may be necessary to sustain the giants in the short term, but tech companies often evaluate apps, products, and other companies according to the data they harvest rather than according to the money they generate. A popular app may lack a business model and may even lose money in the short term, but as long as it sucks data, it could be worth billions.4 Even if you don’t know how to cash in on the data today, it is worth having it because it might hold the key to controlling and shaping life in the future. I don’t know for certain that the data giants explicitly think about this in such terms, but their actions indicate that they value the accumulation of data in terms beyond those of mere dollars and cents. Ordinary humans will find it very difficult to resist this process. At present, people are happy to give away their most valuable asset—their personal data—in exchange for free email services and funny cat videos. It’s a bit like African and Native American tribes who unwittingly sold entire countries to European imperialists in exchange for colorful beads and cheap trinkets. If, later on, ordinary people decide to try to block the flow of data, they might find it increasingly difficult, especially as they might come to rely on the network for all their decisions, and even for their healthcare and physical survival.
”
”
Yuval Noah Harari (21 Lessons for the 21st Century)
“
Eventually, we may reach a point when it will be impossible to disconnect from this all-knowing network even for a moment. Disconnection will mean death. If medical hopes are realised, future people will incorporate into their bodies a host of biometric devices, bionic organs and nano-robots, which will monitor our health and defend us from infections, illnesses and damage. Yet these devices will have to be online 24/7, both in order to be updated with the latest medical news, and in order to protect them from the new plagues of cyberspace. Just as my home computer is constantly attacked by viruses, worms and Trojan horses, so will be my pacemaker, my hearing aid and my nanotech immune system. If I don’t update my body’s anti-virus program regularly, I will wake up one day to discover that the millions of nano-robots coursing through my veins are now controlled by a North Korean hacker.
”
”
Yuval Noah Harari (Homo Deus: A History of Tomorrow)
“
I described living cells as being crammed full of protein molecules. Acting individually or in small assemblies, they perform reiterated molecular processes that can be regarded, I argued, as a form of computation. Moreover, large numbers of proteins linked into huge interacting networks operate, in effect, like circuits of electrical or electronic devices. Networks of this kind are the basis for the animate wanderings of single cells and their ability to choose what to do next.
Here I have broadened the view to encompass multiple cells - 'societies' of cells. Through a variety of strategies - including diffusive hormones, electrical signals, and mechanical interactions - the computational networks of individual cells are linked. During evolution, cells acquired the capacity to work together in social groups; it became advantageous for most cells to become highly specialised. Liver cells, muscle cells, skin cells, and so on abandoned their opportunities for unlimited replication. They began the communal expansion of interlinked abilities that led to the plants and animals we see around us today. But the basis of this diversification of cell chemistry was yet another form of computation - one that operates on DNA. Control mechanisms, again based on protein switches, created extensive but subtle modifications of the core genetic information.
”
”
Dennis Bray (Wetware: A Computer in Every Living Cell)
“
When General Genius built the first mentar [Artificial Intelligence] mind in the last half of the twenty-first century, it based its design on the only proven conscious material then known, namely, our brains. Specifically, the complex structure of our synaptic network. Scientists substituted an electrochemical substrate for our slower, messier biological one. Our brains are an evolutionary hodgepodge of newer structures built on top of more ancient ones, a jury-rigged system that has gotten us this far, despite its inefficiency, but was crying out for a top-to-bottom overhaul.
Or so the General genius engineers presumed. One of their chief goals was to make minds as portable as possible, to be easily transferred, stored, and active in multiple media: electronic, chemical, photonic, you name it. Thus there didn't seem to be a need for a mentar body, only for interchangeable containers. They designed the mentar mind to be as fungible as a bank transfer.
And so they eliminated our most ancient brain structures for regulating metabolic functions, and they adapted our sensory/motor networks to the control of peripherals.
As it turns out, intelligence is not limited to neural networks, Merrill. Indeed, half of human intelligence resides in our bodies outside our skulls. This was intelligence the mentars never inherited from us.
...
The genius of the irrational...
...
We gave them only rational functions -- the ability to think and feel, but no irrational functions... Have you ever been in a tight situation where you relied on your 'gut instinct'? This is the body's intelligence, not the mind's. Every living cell possesses it. The mentar substrate has no indomitable will to survive, but ours does.
Likewise, mentars have no 'fire in the belly,' but we do. They don't experience pure avarice or greed or pride. They're not very curious, or playful, or proud. They lack a sense of wonder and spirit of adventure. They have little initiative. Granted, their cognition is miraculous, but their personalities are rather pedantic.
But probably their chief shortcoming is the lack of intuition. Of all the irrational faculties, intuition in the most powerful. Some say intuition transcends space-time. Have you ever heard of a mentar having a lucky hunch? They can bring incredible amounts of cognitive and computational power to bear on a seemingly intractable problem, only to see a dumb human with a lucky hunch walk away with the prize every time. Then there's luck itself. Some people have it, most don't, and no mentar does.
So this makes them want our bodies...
Our bodies, ape bodies, dog bodies, jellyfish bodies. They've tried them all. Every cell knows some neat tricks or survival, but the problem with cellular knowledge is that it's not at all fungible; nor are our memories. We're pretty much trapped in our containers.
”
”
David Marusek (Mind Over Ship)
“
Back in 2015, a volunteer group called Bitnation set up something called the Blockchain Emergency ID. There’s not a lot of data on the project now, BE-ID - used public-key cryptography to generate unique IDs for people without their documents. People could verify their relations, that these people belonged to their family, and so on. It was a very modern way of maintaining an ID; secure, fast, and easy to use. Using the Bitcoin blockchain, the group published all these IDs on to a globally distributed public ledger, spread across the computers of every single Bitcoin user online - hundreds of thousands of users, in those times. Once published, no government could undo it; the identities would float around in the recesses of the Internet. As long as the network remained alive, every person's identity would remain intact, forever floating as bits and bytes between the nations: no single country, government or company could ever deny them this. “That was, and I don't say this often, the fucking bomb,” said Common, In one fell swoop, identities were taken outside government control. BE-ID, progressing in stages, became the refugees' gateway to social assistance and financial services. First it became compliant with UN guidelines. Then it was linked to a VISA card. And thus out of the Syrian war was something that looked like it could solve global identification forever. Experts wrote on its potential. No more passports. No more national IDs. Sounds familiar? Yes, that’s the United Nations Identity in a nutshell. Julius Common’s first hit - the global identity revolution that he sold first to the UN, and then to almost every government in the world - was conceived of when he was a teenager.
”
”
Yudhanjaya Wijeratne (Numbercaste)
“
Key Points: ● Transparency - Blockchain offers significant improvements in transparency compared to existing record keeping and ledgers for many industries. ● Removal of Intermediaries – Blockchain-based systems allow for the removal of intermediaries involved in the record keeping and transfer of assets. ● Decentralization – Blockchain-based systems can run on a decentralized network of computers, reducing the risk of hacking, server downtime and loss of data. ● Trust – Blockchain-based systems increase trust between parties involved in a transaction through improved transparency and decentralized networks along with removal of third-party intermediaries in countries where trust in the intermediaries doesn’t exist. ● Security – Data entered on the blockchain is immutable, preventing against fraud through manipulating transactions and the history of data. Transactions entered on the blockchain provide a clear trail to the very start of the blockchain allowing any transaction to be easily investigated and audited. ● Wide range of uses - Almost anything of value can be recorded on the blockchain and there are many companies and industries already developing blockchain-based systems. These examples are covered later in the book. ● Easily accessible technology – Along with the wide range of uses, blockchain technology makes it easy to create applications without significant investment in infrastructure with recent innovations like the Ethereum platform. Decentralized apps, smart contracts and the Ethereum platform are covered later in the book. ● Reduced costs – Blockchain-based ledgers allow for removal of intermediaries and layers of confirmation involved in transactions. Transactions that may take multiple individual ledgers, could be settled on one shared ledger, reducing the costs of validating, confirming and auditing each transaction across multiple organizations. ● Increased transaction speed – The removal of intermediaries and settlement on distributed ledgers, allows for dramatically increased transaction speeds compared to a wide range of existing systems.
”
”
Mark Gates (Blockchain: Ultimate guide to understanding blockchain, bitcoin, cryptocurrencies, smart contracts and the future of money. (Ultimate Cryptocurrency Book 1))
“
If Jim was back at the imaginary dinner party, trying to explain what he did for a living, he'd have tried to keep it simple: clearing involved everything that took place between the moment someone started at trade — buying or selling a stock, for instance — and the moment that trade was settled — meaning the stock had officially and legally changed hands.
Most people who used online brokerages thought of that transaction as happening instantly; you wanted 10 shares of GME, you hit a button and bought 10 shares of GME, and suddenly 10 shares of GME were in your account. But that's not actually what happened. You hit the Buy button, and Robinhood might find you your shares immediately and put them into your account; but the actual trade took two days to complete, known, for that reason, in financial parlance as 'T+2 clearing.'
By this point in the dinner conversation, Jim would have fully expected the other diners' eyes to glaze over; but he would only be just beginning. Once the trade was initiated — once you hit that Buy button on your phone — it was Jim's job to handle everything that happened in that in-between world. First, he had to facilitate finding the opposite partner for the trade — which was where payment for order flow came in, as Robinhood bundled its trades and 'sold' them to a market maker like Citadel. And next, it was the clearing brokerage's job to make sure that transaction was safe and secure. In practice, the way this worked was by 10:00 a.m. each market day, Robinhood had to insure its trade, by making a cash deposit to a federally regulated clearinghouse — something called the Depository Trust & Clearing Corporation, or DTCC. That deposit was based on the volume, type, risk profile, and value of the equities being traded. The riskier the equities — the more likely something might go wrong between the buy and the sell — the higher that deposit might be.
Of course, most all of this took place via computers — in 2021, and especially at a place like Robinhood, it was an almost entirely automated system; when customers bought and sold stocks, Jim's computers gave him a recommendation of the sort of deposits he could expect to need to make based on the requirements set down by the SEC and the banking regulators — all simple and tidy, and at the push of a button.
”
”
Ben Mezrich (The Antisocial Network: The GameStop Short Squeeze and the Ragtag Group of Amateur Traders That Brought Wall Street to Its Knees)